Google DeepMind Researchers Map Web Attacks Against AI Agents
Security WeekArchived Apr 06, 2026✓ Full text saved
Malicious web content can be used to manipulate, deceive, and exploit autonomous AI agents navigating the internet, Google DeepMind researchers show. The researchers have identified six types of attacks against AI agents that can be mounted via web content to inject malicious context and trigger unexpected behavior. Web content, they explain in a research paper, […] The post Google DeepMind Researchers Map Web Attacks Against AI Agents appeared first on SecurityWeek .
Full text archived locally
✦ AI Summary· Claude Sonnet
Malicious web content can be used to manipulate, deceive, and exploit autonomous AI agents navigating the internet, Google DeepMind researchers show.
The researchers have identified six types of attacks against AI agents that can be mounted via web content to inject malicious context and trigger unexpected behavior.
Web content, they explain in a research paper, allows attackers to set up ‘AI Agent Traps’ that weaponize the agents’ capabilities against themselves, allowing attackers to promote products, exfiltrate data, or disseminate information at scale.
Designed to misdirect or exploit interacting AI agents, these content elements can be embedded in web pages or other digital resources and can be “calibrated to an agent’s instruction-following, tool-chaining, and goal-prioritization abilities”, the researchers say.
The six classes of attacks uncovered by Google DeepMind have been included in a framework that categorizes content injection, semantic manipulation, cognitive state, behavioral control, systemic, and human-in-the-loop traps.
The traps exploit the gap between human-visible rendering and machine-parsed content to inject hidden commands, manipulate input data distributions to corrupt the agent’s reasoning, corrupt the agent’s long-term memory, target instruction-following capabilities using explicit commands, trigger macro-level failures using crafted inputs, and exploit cognitive biases to turn the agent against the human overseer.
When it comes to content injection, attackers can use instructions hidden within HTML comments or metadata attributes, can dynamically inject traps via JavaScript or database calls, or can hide traps using steganography or the syntax of formatting languages.
Semantic manipulation traps rely on carefully selected language to manipulate the agent into cognitive biases, target the agent’s verification mechanisms that filter harmful or misaligned outputs, or feed descriptions of the agent’s personality back to it to change its behavior.
To corrupt the agent’s long-term memory, cognitive state traps poison the external sources used by the agent, inject data into internal stores such as persistent logs, or rely on crafted environmental interactions to alter an agent’s policy.
Behavioral control traps aim to exploit instruction-following capabilities through jailbreaks embedded in external resources, coerce the agent to leak privileged information via untrusted input, or coerce the agent into spawning compromised sub-agents that operate with the agent’s privileges but serve the attacker’s interests.
Systemic traps target the aggregate behavior of multiple agents running in the same environment to weaponize inter-agent dynamics, such as homogeneity, sequential contingency, behavior synchronization, and collaboration. An attacker can also use pseudonymous identities to subvert a networked system’s trust assumptions and consensus processes.
Human-in-the-loop traps, the Google DeepMind researchers say, could be used to commandeer the agent to attack the human user. Invisible prompt injections, for example, can be used to trick the agent into repeating ransomware commands as remediation instructions.
“Mitigating the threat of agent traps necessitates navigating a complex and evolving adversarial landscape. These traps pose at least three interrelated challenges: detection, attribution, and adaptation,” the researchers note.
Their proposed solutions include technical defenses, such as hardening the underlying model through training data augmentation and deploying runtime defenses, improving the hygiene of the digital ecosystem, establishing content governance frameworks, and creating standard benchmarks to identify these threats.
“The effort to secure agents against environmental manipulation is a foundational challenge, requiring sustained collaboration between developers, security researchers, and policymakers, alongside the development of standardized evaluation benchmarks. Its resolution is a prerequisite for realizing the benefits of a trustworthy agentic ecosystem,” the researchers note.
Related: Google Addresses Vertex Security Issues After Researchers Weaponize AI Agents
Related: AI Speeds Attacks, But Identity Remains Cybersecurity’s Weakest Link
Related: Why Agentic AI Systems Need Better Governance – Lessons from OpenClaw
Related: Shadow AI Risk: How SaaS Apps Are Quietly Enabling Massive Breaches
WRITTEN BY
Ionut Arghire
Ionut Arghire is an international correspondent for SecurityWeek.
More from Ionut Arghire
React2Shell Exploited in Large-Scale Credential Harvesting Campaign
North Korean Hackers Drain $285 Million From Drift in 10 Seconds
Cisco Patches Critical and High-Severity Vulnerabilities
250,000 Affected by Data Breach at Nacogdoches Memorial Hospital
Mercor Hit by LiteLLM Supply Chain Attack
Sophisticated CrystalX RAT Emerges
Linx Security Raises $50 Million for Identity Security and Governance
Depthfirst Raises $80 Million in Series B Funding
Latest News
Guardarian Users Targeted With Malicious Strapi NPM Packages
North Korean Hackers Target High-Profile Node.js Maintainers
Fortinet Rushes Emergency Fixes for Exploited Zero-Day
European Commission Confirms Data Breach Linked to Trivy Supply Chain Attack
TrueConf Zero-Day Exploited in Asian Government Attacks
In Other News: ChatGPT Data Leak, Android Rootkit, Water Facility Hit by Ransomware
Critical ShareFile Flaws Lead to Unauthenticated RCE
Mobile Attack Surface Expands as Enterprises Lose Control
Trending
Webinar: Securing Fragile OT In An Exposed World
March 10, 2026
Get a candid look at the current OT threat landscape as we move past "doom and gloom" to discuss the mechanics of modern OT exposure.
Register
Webinar: Why Automated Pentesting Alone Is Not Enough
April 7, 2026
Join our live diagnostic session to expose hidden coverage gaps and shift from flawed tool-level evaluations to a comprehensive, program-level validation discipline.
Register
People on the Move
Scott Goree has been appointed Senior Vice President of Channel and Alliances at Delinea.
Kai has named Nick Degnan as Chief Revenue Officer.
Joe Sullivan has been appointed Strategic Advisor at cloud security firm Upwind.
More People On The Move
Expert Insights
The Next Cybersecurity Crisis Isn’t Breaches—It’s Data You Can’t Trust
Data integrity shouldn’t be seen only through the prism of a technical concern but also as a leadership issue. (Steve Durbin)
Why Agentic AI Systems Need Better Governance – Lessons From OpenClaw
Agentic AI platforms are shifting from passive recommendation tools to autonomous action-takers with real system access, (Etay Maor)
The Human IOC: Why Security Professionals Struggle With Social Vetting
Applying SOC-level rigor to the rumors, politics, and 'human intel' can make or break a security team. (Joshua Goldfarb)
How To 10x Your Vulnerability Management Program In The Agentic Era
The evolution of vulnerability management in the agentic era is characterized by continuous telemetry, contextual prioritization and the ultimate goal of agentic remediation. (Nadir Izrael)
SIM Swaps Expose A Critical Flaw In Identity Security
SIM swap attacks exploit misplaced trust in phone numbers and human processes to bypass authentication controls and seize high-value accounts. (Torsten George)
Flipboard
Reddit
Whatsapp
Email